ECM: Enhanced confidentiality method to ensure the secure migration of data in VM to cloud environment
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.3.53Keywords:
Data migration, Data authentication, Authenticity, Data integrity, Cloud security, Hashing.cDimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Abstract
How to Cite
Downloads
Similar Articles
- M. Ragul, A. Aloysius, V. Arul Kumar, Enhancing IoT blockchain scalability through the eepos consensus algorithm , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- N. Saranya, M. Kalpana Devi, A. Mythili, Summia P. H, Data science and machine learning methods for detecting credit card fraud , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- S. Prabagar, Vinay K. Nassa, Senthil V. M, Shilpa Abhang, Pravin P. Adivarekar, Sridevi R, Python-based social science applications’ profiling and optimization on HPC systems using task and data parallelism , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Ellakkiya Mathanraj, Ravi N. Reddy, Enhanced principal component gradient round-robin load balancing in cloud computing , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- S V Arulvani, Dr. C. Jayanthi, Logistic Elitist Liquid Neural Network For Student Dropout Prediction , The Scientific Temper: Vol. 17 No. 02 (2026): The Scientific Temper
- Chandrasekaran M, Rajesh P K, Optimization of cost to customer of power train in commercial vehicle using knapsack dynamic programming influenced by vehicle IoT data , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- K. Vani, S. Sujatha, Fault tolerance systems in open source cloud computing environments–A systematic review , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- K. Akila, Location-specific trusted third-party authentication model for environment monitoring using internet of things and an enhancement of quality of service , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Trust-based symmetric game theory for physical layer security in wi-fi communication , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
- A. Rukmani, C. Jayanthi, Fuzzy optimization trust aware clustering approach for the detection of malicious node in the wireless sensor networks , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
<< < 2 3 4 5 6 7 8 9 10 11 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Raja Selvaraj, Manikandasaran S. Sundari, EAM: Enhanced authentication method to ensure the authenticity and integrity of the data in VM migration to the cloud environment , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper

